K-12 schools utilize a growing number of technologies to operate effectively, ranging from technologies for learning to technologies that manage student and personnel data. We share findings from an analysis of 23 school district websites for technologies used in a number of K-12 school districts surrounding a public, research university in a southeast region of the United States. In addition, we also share findings on technologies used in K-12 school districts from interviews with 12 technology directors. We propose a technology classification framework including educational technologies, management technologies, support technologies, networking technologies, and security technologies in addition to identifying various technologies that are currently used by school districts based on this framework. This framework has implications for K-12 technology adoption and clarifying the roles of school technology personnel.
more »
« less
The Role of Computer Technologies in Structuring Evidence Gathering in Cybercrime Investigations: A Qualitative Analysis
In recent decades, law enforcement agencies have increasingly prioritized cybercrime investigations, as evinced by the growing adoption of specialized cybercrime units and personnel. A burgeoning literature has emerged which examines cybercrime units and investigators. Yet, little attention has been given to the role of computers in shaping these investigations. This study addresses this gap through an analysis of qualitative interviews with 47 cybercrime investigative personnel including sworn detectives, civilian analysts, and unit administrators. This analysis confirms and extends prior research by exploring challenges presented by computers to cybercrime investigations including issues surrounding anonymization, encryption, jurisdiction, caseloads, backlogs, data volume, eliciting data from electronic service providers, and the ever-changing technological landscape. Also considered are the advantages offered by such technologies for cybercrime investigations. Computer and network technologies facilitate undercover investigations, provide easy access to global networks and databases, and supply large quantities of evidence to help secure convictions. Finally, this study considers elements of cybercrime investigations not supplanted by computer databases, automation, or network systems. Directions for future research and policy implications are considered.
more »
« less
- Award ID(s):
- 1916284
- PAR ID:
- 10401433
- Publisher / Repository:
- SAGE Publications
- Date Published:
- Journal Name:
- Criminal Justice Review
- Volume:
- 50
- Issue:
- 1
- ISSN:
- 0734-0168
- Format(s):
- Medium: X Size: p. 67-84
- Size(s):
- p. 67-84
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of online cybercrime communities, where actors trade products and services, and also learn from each other. Accordingly, understanding the operation and behavior of these communities is of great interest, and they have been explored across multiple disciplines with different, often quite novel, approaches. This survey explores the challenges inherent to the field and the methodological approaches researchers used to understand this space. We note that, in many cases, cybercrime research is more of an art than a science. We highlight the good practices and propose a list of recommendations for future cybercrime community scholars, including taking steps to verify and validate results, establishing privacy and ethical research practices, and mitigating the challenge of ground truth data.more » « less
-
Jaishankar, K. (Ed.)Compared to other topics, cybercrime is a relatively new addition to the criminological literature. interest in the topic has grown over the past decade, with a handful of scholars leading efforts to generate empirical understanding about the topic. Common conclusions reached in these studies are that more research is needed, cybercrime is interdisciplinary in nature, and cybercrime should be addressed as an international problem. In this study, we examine a sample of 593 prior cybercrime scholarly articles to identify the types of research strategies used in them, the patterns guiding those strategies, whether the research is interdisciplinary, and the degree to which scholars engage in international cybercrime studies. Attention is also given to co-authorship as well as citation patterns. Implications for future research are provided.more » « less
-
Network monitoring is an increasingly important task in the operation of today’s large and complex computer networks. In recent years, technologies leveraging software defined networking and programmable hardware have been proposed. These innovations enable operators to get fine-grained insight into every single packet traversing their network at high rates. They generate packet or flow records of all or a subset of traffic in the network and send them to an analytics system that runs specific applications to detect performance or security issues at line rate in a live manner. Unexplored, however, remains the area of detailed, inter- active, and retrospective analysis of network records for debugging or auditing purposes. This is likely due to technical challenges in storing and querying large amounts of network monitoring data efficiently. In this work, we study these challenges in more detail. In particular, we explore recent advances in time series databases and find that these systems not only scale to millions of records per second but also allow for expressive queries significantly simplifying practical network debugging and data analysis in the context of computer network monitoring.more » « less
-
Abstract Quantum computing holds transformative promise, but its realization is hindered by the inherent susceptibility of quantum computers to errors. Quantum error mitigation has proved to be an enabling way to reduce computational error in present noisy intermediate scale quantum computers. This research introduces an innovative approach to quantum error mitigation by leveraging machine learning, specifically employing adaptive neural networks. With experiment and simulations done on 127-qubit IBM superconducting quantum computer, we were able to develop and train a neural network architecture to dynamically adjust output expectation values based on error characteristics. The model leverages a prior classifier module outcome on simulated quantum circuits with errors, and the antecedent neural network regression module adapts its parameters and response to each error characteristics. Results demonstrate the adaptive neural network’s efficacy in mitigating errors across diverse quantum circuits and noise models, showcasing its potential to surpass traditional error mitigation techniques with an accuracy of 99% using the fully adaptive neural network for quantum error mitigation. This work presents a significant application of classical machine learning methods towards enhancing the robustness and reliability of quantum computations, providing a pathway for the practical realization of quantum computing technologies.more » « less
An official website of the United States government
